• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
CryptionPro Flyer English
 

CryptionPro Flyer English

on

  • 595 views

CryptionPro® encrypts and protects your company data on mobile storage media – fully automated.

CryptionPro® encrypts and protects your company data on mobile storage media – fully automated.

Further Details: http://cynapspro.com/US/products/cryptionpro

Statistics

Views

Total Views
595
Views on SlideShare
595
Embed Views
0

Actions

Likes
0
Downloads
1
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    CryptionPro Flyer English CryptionPro Flyer English Document Transcript

    • CryptionPro CryptioPro protects your company data on mobile storage media CryptionPro® encrypts all data that is copied to external storage media. This happens automatically and reliably in the background without disrupting the work of the user. At another workplace within your company, the data can be read - again decryption happens fully automatically without users even being aware that it happens – with encryp- tion being restricted to those groups or departments you have specified. Encrypted takes place at the file level, which allows users to exclude specific files from being encrypted – if the appropriate permissions have been granted. This may be necessary when you want to pass files, such as a presentations or other materials to a business partner or if you copy files from and to somebody’s USB-stick. In addition, CryptionPro ® support a mobile encryption, allow- ing you protecting sensitive data you may have been entrusted with on its way to your office. YOUR BENEFITS Protects your company data or sensi- tive data entrusted to your employees in case of loss or theft Meets legal data protection require- ments Enables the secure use of mobile stor- age media CryptionPo Mobile allows access to your encrypted data anytime and any place SELECTED FEATURES Support for various encryption op- tions: automatic encryption, file-based encryption Location-independent support: in the company network or on the road Support for a variety of encryption algorithms: AES 256 Bit; Blowfish 256 Bit Select among a variety of encryption options and methods Secure central password management with master password "If you consider the USB Ports open up Vulnerabilities importance of corpo- The high capacity of today's USB devices allows rate IT for business users to copy entire databases. This is an ex- success, it soon be- tremely critical threat that could lead to a high comes clear that we must not close our eyes to financial loss if no protective measures are the fact that a lot of sensitive data regularly taken. Endpoints can only be reliably protected leaves the company on mobile disks without through central and intelligent management. any protection. Protective measures must be This includes access to USB ports, control and automated, and neither allow bypasses nor logging of data transmissions, as well as the impact user productivity. We therefore de- protection of data on mobile devices using cided to partner with cynapspro. " secure encryption. Herbert Uhl, CEO of Matrix42 AG
    • cynapspro Endpoint Data Protection cynapspro develops software solutions for reliable endpoint data protection in the enterprise network and covers the following areas: DevicePro prevents data loss through open ports and external storage devices. CryptionPro encrypts and protects your company data on mobile storage media – fully automated. CryptionPro HDD protects your company data by en- crypting the hard drive. ApplicationPro blocks unwanted applications and prevents the use of unlicensed software. ErasePro ensures that deleted files are not recover- able. PowerPro cuts energy costs and reports suspicious activity. The following features distinguish all cynapspro pected data abuse or loss, cynapspro knows which solutions: files have been accessed, by whom and when. Intuitive Management Console Minimal System Requirements The single user-friendly Management Console is Apart from a SQL database (the free MSDE or SQL largely self-explanatory and only a minimum of train- Server 2005 Express edition are fully sufficient), there ing is required. The clear and concise structure allows is no additional software required, such as the IIS the compilation of complex setting with just a few Server or .NET client. Consequently, no new vulner- mouse clicks. abilities are introduced by installing additional back office software and memory and CPU utilization is Real-Time Management minimal. All changes to access permissions will be immediately pushed out to the clients and stored in the cynapspro Secure Kernel Driver Technology database. Users don’t need to restart their machines The secure cynapspro® kernel driver technology is or even connect to the company network in order to loaded into the operating system during the boot upgrade their usage rights. sequence and thus ensures that the service running on the client is not visible to the end user. It can only Rights Management at Group Level, User Level or be stopped or uninstalled by an authorized Adminis- Computer Level trator. Reduce your administrative effort. Manage individual access rights directly with the respective users, Integration with Third Party Applications groups or computers. An XML interface allows the allocation of access per- missions from an existing customer Helpdesk or Ser- Synchronization of User Directories vice Desk implementation in a fully automated way, Existing users and user group definitions from Micro- leveraging existing processes, approval workflows, soft Active Directory or Novell eDirectory are im- notifications and management reports. There will be ported by the cynapspro server thus reducing the no need for service desk workers to use an additional workload for defining user groups for Access Client console. Lists (ACLs) as well as the sources of error. Distributed Environments Full Audit Log Several mutually replicating cynapspro servers pro- Password-protected, detailed access statistics with vide load balancing capabilities in enterprise environ- filter and sort order functionality. In case of sus- ments. Free Trial Version Contact On the cynapspro website, we offer a full version cynapspro GmbH of our software for download, including a free 5- Am Hardtwald 1 user license. D-76275 Ettlingen Please contact us if you are interested in testing Tel.: +49 7243 / 945-250 our software in a larger environment. Email: contact@cynapspro.com Internet: www.cynapspro.com March 2010 - Copyright cynapspro GmbH 2010—All rights reserved.